Hey guys! My name is "Sagar Kumar Dubey" but you can also call me "Sagar CYBER Expert"! In this Blog you will find Cyber Security,Tips&Tricks,Latest Cyber and Network News and many more....

Pages

Saturday, December 17, 2016

CERTIFICATION IN HACKING

6 week (Short term course)
2 days (workshop)
6 months (Diploma course)

1.CEH (Certified Ethical Hacker)
Exam Code-312-50
Global Appraved
Online Exam Fee:-18000-28000
Version-9

2.CHFI (Computer Hacker Forensic Investigator)
Exam Code-312-49
Approved by Ec-Council
Online Exam Fee:-18000-28000
Version-9

3.CSCU (Certified Secure Computer User)
Exam Code-112-12
Credit Towards Certification: Secure Computer User 
Specialist (CSCU)

Course Outline

  • Introduction to Security
  • Securing Operating Systems
  • Malware and Antivirus
  • Internet Security
  • Security on Social Networking Sites
  • Securing Email Communications
  • Securing Mobile Devices
  • Securing the Cloud
  • Securing Network Connections
  • Data Backup and Disaster Recovery
 Online Exam-Fee:-10000-18000
version-9

4.LPT (License of penetration testing)
Global Approved by-Ec -Council
4Year working Experience
CEH+CSA (Certified security Analyst)+Resume
Online Exam:-1,50,000
Validation:- Life Time
Share:

Tuesday, December 13, 2016

MD5

MD5

MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specific individual. MD5, which was developed by Professor Ronald L. Rivest of MIT, is intended for use with digital signature applications, which require that large files must be compressed by a secure method before being encrypted with a secret key, under a public keycryptosystem. MD5 is currently a standard, Internet Engineering Task Force (IETF) Request for Comments (RFC) 1321. According to the standard, it is "computationally infeasible" that any two messages that have been input to the MD5 algorithm could have as the output the same message digest, or that a false message could be created through apprehension of the message digest. MD5 is the third message digest algorithm created by Rivest. All three (the others are MD2 and MD4) have similar structures, but MD2 was optimized for 8-bit machines, in comparison with the two later formulas, which are optimized for 32-bit machines. The MD5 algorithm is an extension of MD4, which the critical review found to be fast, but possibly not absolutely secure. In comparison, MD5 is not quite as fast as the MD4 algorithm, but offers much more assurance of data security.
Share:

what is hacking

What is hacking?

There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.

Types of Hackers

SymbolDescription
What is Hacking ? An IntroductionEthical Hacker (White hat):A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.
What is Hacking ? An IntroductionCracker (Black hat):A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
What is Hacking ? An IntroductionGrey hat:A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.
What is Hacking ? An IntroductionScript kiddies:A non-skilled person who gains access to computer systems using already made tools.
What is Hacking ? An IntroductionHacktivist:A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
What is Hacking ? An IntroductionPhreaker:A hacker who identifies and exploits weaknesses in telephones instead of computers.
Share:

OSI MODEL

Introduction to OSI Model
OSI model is based on the proposal developed by the International Standards Organization (ISO).

This model is called ISO OSI (Open Systems Interconnection) Reference model because it deals with connecting open systems (systems that are open for communication with other systems)

We call it as OSI Model.



Physical Layer :
          Provides physical interface for transmission of information.
         Defines rules by which bits are passed from one system to another on a physical communication medium.
Data Link Layer:
         Data link layer attempts to provide reliable communication over the physical layer interface.
         Breaks the outgoing data into frames and reassemble the received frames.
Network Layer:
         Implements routing of frames (packets) through the network.
         Defines the most optimum path the packet should take from the source to the destination
         Defines logical addressing so that any endpoint can be identified.
Transport Layer:
         Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers.
         Ensures that the data units are delivered error free.
         Ensures that data units are delivered in sequence.
         Ensures that there is no loss or duplication of data units.
Session Layer:
         Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications.
         This layer requests for a logical connection to be established on an end-user’s request.
Presentation Layer:
         Presentation layer defines the format in which the data is to be exchanged between the two communicating entities.
         Also handles data compression and data encryption (cryptography).
Application Layer:
         Application layer interacts with application programs and is the highest level of OSI model.
         Application layer contains management functions to support distributed applications.

         Examples of application layer are applications such as file transfer, electronic mail, remote login etc.
Share:

security accounts manager

Security Accounts Manager (SAM)

In the SAM, each user account can be assigned a local area network (LAN) password and a Windows password. Both are encrypted. If someone attempts to log on to the system and the user name and associated passwords match an entry in the SAM, a sequence of events takes place ultimately allowing that person access to the system. If the user name or passwords do not properly match any entry in the SAM, an error message is returned requesting that the information be entered again.
In personal computers (PCs) not connected into a LAN and for which there is only one user, Windows asks for only one password when the system is booted up. This function can be disabled if the user does not want to enter authentication data every time the computer is switched on or restarted. The main purpose of the SAM in a PC environment is to make it difficult for a thief to access the data on a stolen machine. It can also provide some measure of security against online hackers.
Share:
sagar dubey. Powered by Blogger.

About Us

Welcome to sagarghost.blogspot.in We are here to help to many people who are wants or in search of Tips&Tricks,cyber security,Wants to Know Latest cyber and network news. Here You will Find all Related Resources... For absolutely free!!!